<?xml-stylesheet type="text/xsl" href="https://community.element14.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Don’t Wait Until the Next Hacking Headline to Consider Design Security</title><link>/technologies/embedded/b/blog/posts/don-t-wait-until-the-next-hacking-headline-to-consider-design-security</link><description>By Christine Young, Blogger, Maxim Integrated From Yahoo and LinkedIn to the Internal Revenue Service, the Democratic National Committee, and everyday objects like dolls and DVRs, it seems that almost nothing is safe from hacking. Indeed, ...</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator></channel></rss>